No Prison for Ex-Cop Who Used Tor to View Child Abuse Material

A former Kent Police officer received a suspended prison sentence despite having child abuse content in his possession at the time of his arrest.

Thomas Blant, 38, a former police constable, was sentenced to one year in prison, suspended for two years. Blant admitted that he had used the Tor browser to access child abuse content.

A picture of Thomas Blant, 38.

Thomas Blant, 38.

[DNL Note: The NCA claims they identified that Blant was using Tor to access a CSA wesbite. How did they associate his Tor traffic with his home I.P. address? ]

Investigators with the National Crime Agency (NCA) established that someone using an I.P. address associated with Blant’s home was accessing a child pornography site via Tor. Police raided his home on January 19, 2020. During the raid, investigators seized several electronic devices including Blant’s phone and laptop.

Police questioned Blant and his wife. Blant’s wife provided the police that she had been working at the time the child abuse site had been accessed. After hearing this, the police released her. The police learned that Blant was off-duty on the day the site had been accessed. Police arrested Blant. Kent Police suspended Blant after his arrest. He had worked as a constable for six years.

While analyzing Blant’s laptop, investigators found the Tor Browser Bundle and a so-called “computer cleaning application.” Investigators recovered 17 category A and C child abuse images from the laptop. They found four more images on one of Blant’s phones.

Blant pleaded guilty to two counts of possession of child abuse images at the Folkestone Magistrates Court on July 22, 2021. The guilty plea resulted in his dismissal from the Kent Police.

Blant appeared before Judge Philip Statman at Maidstone Crown Court on October 6, 2021, for his sentencing hearing. He was sentenced to one year in prison suspended for two years. Judge Statman also ordered a five-year sexual harm prevention order and placed him on the sex offenders register for 10 years.

Speaking following Blant’s sentence NCA’s Martin Ludlow said:

“Blant’s offending is an outrageous misuse of trust. His role as a police officer was to protect the public. Instead, he sought out images of child abuse for his sexual gratification. Offenders who view such material online only encourage those willing to sexually abuse children in the real world. Combatting this threat remains one of the highest priorities for the NCA. We are committed to targeting the most dangerous offenders and those who, like Blant, go to great lengths to hide their activity, believing they can operate with impunity online. As this investigation shows, there is nowhere to hide. We will use all of the tools at our disposal to identify those who pose a sexual threat to children and ensure they are brought to justice.”

finding Zero day
40d8b910 Mon, Oct 11, 2021

HOW did his ip get exposed

147e17f0 Mon, Oct 11, 2021

Probably javascript

b1d2fa30 Tue, Oct 12, 2021

They may have put malware in the videos that unmasked the real IP address

b2d419b0 Tue, Oct 12, 2021

How tho? Maybe if it was an executable or something?

This is a serious issue tho, very scary @W@

c27aeb10 Tue, Oct 12, 2021

I once read feds put executable file alongside actual CP hoping pedo will accidentally click it but I doubt it was like that in this situation. I have written possible scenarios but seems like my post got flagged and has to wait for manual approval.

1246e2d0 Tue, Oct 12, 2021

Feds can't simply deanonymize Tor users, it's incredibly hard and when they do it's mostly because of user error (in very rare cases due to exploit.) This news is very misleading. What could possibly happen: -dude accesses pedo site via Tor but downloaded CSAM without Tor (it's usually hosted on external clearnet websites) -like Meatballs said, malware (it's very rare to exploit media player with non-executable file so I doubt it, unless there was video file + malware file and he clicked latter though it's not common to find something like that) -dude accessed FBI honeypot (I'm not sure they exist but dude might not be savvy enough to know about legit links and found honeypot so who knows) and played "kiddie_porn.mp4.exe" (as I said not likely but it's plausible) -dude shared CP on clearnet in some way like messaging app (but article would state that though they deliberately don't say how exactly he was caught) -dude accessed pedo site on phone and files got synchronized with cloud and flagged (they mention laptop but there were files on phone too so he accessed CSA on both? Transferred from laptop to phone? Maybe got flagged on Windows laptop with OneDrive?) -dude used work laptop that had spyware/bossware (very plausible but we don't have details) Dude was tech savvy enough to use Tor and have “computer cleaning application” (like CCleaner lol) but not enough to encrypt drive, not get CSA on phone and ultimately not to get caught. I think it's scare news to discourage Tor use and make people believe feds are omnipotent (they are not.)

7340a280 Thu, Oct 14, 2021

Thanks, very interesting

d65319f0 Wed, Oct 13, 2021

There used to be a way to embed html/javascript into windows media files back in the day. I wonder if something like that was used.

3552aac0 Fri, Oct 15, 2021

LOL! A pedo AND a pig? He better get used to taking BBC, might as well just execute him for his own safety.

ff036630 Sun, Oct 17, 2021

i hope that piece of shit gets his skull beaten in

Comment Submitted. Unless flagged for manual review, your comment should show up in about one minute.


Comment Error. If you filled the fields out correctly, feel free to shoot us an email.


See Also